darktrace_model_alerts_CL //anything starting with 'Dt' is not an ASIM mapping
| where dtProduct_s =="System Alert"
| extend EventVendor="Darktrace", EventProduct="Darktrace DETECT"
| project-rename ThreatCategory=dtProduct_s, EventStartTime=time_s, NetworkRuleName=friendlyName_s, SrcIpAddr=deviceIP_s, SrcHostname=hostname_s, ThreatRiskLevel=priority_code_d, ThreatRiskCategory=priority_s, DtSeverity=Severity, DtName=name_s, DtStatus=status_s, DtMessage=Message, DtURL=url_s, DtUUID=uuid_g
queryPeriod: 5m
query: |
darktrace_model_alerts_CL //anything starting with 'Dt' is not an ASIM mapping
| where dtProduct_s =="System Alert"
| extend EventVendor="Darktrace", EventProduct="Darktrace DETECT"
| project-rename ThreatCategory=dtProduct_s, EventStartTime=time_s, NetworkRuleName=friendlyName_s, SrcIpAddr=deviceIP_s, SrcHostname=hostname_s, ThreatRiskLevel=priority_code_d, ThreatRiskCategory=priority_s, DtSeverity=Severity, DtName=name_s, DtStatus=status_s, DtMessage=Message, DtURL=url_s, DtUUID=uuid_g
name: Darktrace System Status
entityMappings:
- fieldMappings:
- columnName: SrcHostname
identifier: HostName
entityType: Host
- fieldMappings:
- columnName: SrcIpAddr
identifier: Address
entityType: IP
eventGroupingSettings:
aggregationKind: AlertPerResult
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Darktrace/Analytic Rules/CreateAlertFromSystemStatus.yaml
alertDetailsOverride:
alertDynamicProperties:
- value: DtURL
alertProperty: AlertLink
- value: EventVendor
alertProperty: ProviderName
- value: EventProduct
alertProperty: ProductName
- value: ThreatCategory
alertProperty: ProductComponentName
alertSeverityColumnName:
alertDescriptionFormat: '{{DtMessage}}'
alertDisplayNameFormat: 'Darktrace: {{ThreatRiskLevel}} - {{NetworkRuleName}}'
alertTacticsColumnName:
requiredDataConnectors:
- connectorId: DarktraceRESTConnector
dataTypes:
- darktrace_model_alerts_CL
description: |
'This rule creates Microsoft Sentinel Alerts based on Darktrace system status alerts for health monitoring, fetched every 5 minutes.'
kind: Scheduled
version: 1.1.0
queryFrequency: 5m
severity: Informational
relevantTechniques:
triggerOperator: gt
triggerThreshold: 0
customDetails:
ThreatRiskCategory: ThreatRiskCategory
DtMessage: DtMessage
EventStartTime: EventStartTime
DtSeverity: DtSeverity
DtStatus: DtStatus
ThreatRiskLevel: ThreatRiskLevel
NetworkRuleName: NetworkRuleName
DtName: DtName
tactics:
id: 2e629769-60eb-4a14-8bfc-bde9be66ebeb